Sciweavers

2327 search results - page 361 / 466
» Secure Image Filtering
Sort
View
CCS
2007
ACM
15 years 5 months ago
Highly efficient techniques for network forensics
Given a history of packet transmissions and an excerpt of a possible packet payload, the payload attribution problem requires the identification of sources, destinations and the t...
Miroslav Ponec, Paul Giura, Hervé Brön...
CCS
2006
ACM
15 years 5 months ago
Packet vaccine: black-box exploit detection and signature generation
In biology, a vaccine is a weakened strain of a virus or bacterium that is intentionally injected into the body for the purpose of stimulating antibody production. Inspired by thi...
XiaoFeng Wang, Zhuowei Li, Jun Xu, Michael K. Reit...
CVPR
2009
IEEE
16 years 8 months ago
Picking the best DAISY
Local image descriptors that are highly discriminative, computational efficient, and with low storage footprint have long been a dream goal of computer vision research. In this ...
Gang Hua, Matthew Brown, Simon A. J. Winder
101
Voted
CVPR
2005
IEEE
16 years 3 months ago
Concurrent Subspaces Analysis
A representative subspace is significant for image analysis, while the corresponding techniques often suffer from the curse of dimensionality dilemma. In this paper, we propose a ...
Dong Xu, Shuicheng Yan, Lei Zhang, HongJiang Zhang...
CVPR
2007
IEEE
16 years 3 months ago
Utilizing Variational Optimization to Learn Markov Random Fields
Markov Random Field, or MRF, models are a powerful tool for modeling images. While much progress has been made in algorithms for inference in MRFs, learning the parameters of an M...
Marshall F. Tappen